Computational Intelligence in Security for Information Systems 2010: Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Systems (CISIS’10)

Front Cover
Álvaro Herrero, Emilio Corchado, Carlos Redondo Gil, Ángel Alonso Alvarez
Springer Science & Business Media, Oct 7, 2010 - Computers - 240 pages
0 Reviews
rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Intelligence and Soft Computing contains accepted papers presented at CISIS 2010, which was held in León, Spain, on November 11–12, 2010. CISIS 2010 received over 50 technical submissions. After a thorough peer-review process, the International Program Committee - lected 25 papers which are published in this conference proceedings. This allowed the Scientific Committee to verify the vital and crucial nature of the topics - volved in the event, and resulted in an acceptance rate close to 50% of the ori- nally submitted manuscripts.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 2 Agents and MultiAgent Systems
41
Chapter 3 Image Video and Speech Processing
70
Chapter 4 Network Security
97
Chapter 5 Watermarking
161
Chapter 6 Cryptography
181
Chapter 7 Industrial and Commercial Applications of Intelligent Methods for Security
200
Author Index
239
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information